Feeds

Microsoft's ARM deal fuels hope of a chilled-out Xbox

Planning an A4, or perhaps a Cell?

High performance access to file storage

Microsoft has licensed ARM's architecture, but while an ARM might be found in every mobile phone it seems Redmond is more interested in putting some ARM goodness into the Xbox.

An architecture licence isn't necessary for most things – 200 licensees happily make ARM chips without bothering to licence the architecture itself, including Samsung's use of an ARM in the heart of Apple's A4 processor. But Qualcomm, Marvell and Infineon do like to muck about with the ARM micro-architecture in a way that requires this kind of licence, and now Microsoft has bought the right to play that game too.

Quite why Microsoft wants to be able to make changes at such a low level neither company is saying, but it's almost certainly nothing to do with mobile phones. Windows Phone 7 handsets are already going into production, and being made by a variety of manufacturers using different processors (all based on an ARM core), so it's hardly likely that Microsoft is suddenly going to push out its own chips.

Nintendo uses ARM chips in its mobile consoles, but it's hard to imagine Microsoft making a play in that space given how hard Xbox Live is being pushed as a feature of Windows Phone 7.

The Xbox line, however, is in serious need of a new architecture. Microsoft's approach to gaming consoles (and computers) has always been to have a whopping great chip in the middle doing most of the work. The Xbox 360 still suffers from the concentration of heat that this approach creates, depending on a heatsink that expands and contracts until it eventually touches one of the chip's contacts, shorting out the system.

Increasing the processing power for the next incarnation of the Xbox will need a different approach, which is the most likely reason for Redmond to want access to ARM's innermost secrets.

Neither company is saying how much the licence cost, or why Microsoft is so keen to get its hands dirty, but unless Steve Ballmer surprises us all by reviving the Kin we should expect to see a handful of ARM chips nestled in the next version of the Xbox. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.